[CVE-2019-0189] Apache OFBiz remote code execution and arbitrary file delete via Java deserialization

Related Vulnerabilities: CVE-2019-0189  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
[CVE-2019-0189] Apache OFBiz remote code execution and arbitrary file delete via Java deserialization

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Jacopo Cappellato &lt;jacopoc () apache org&gt;

Date: Tue, 10 Sep 2019 15:29:21 -0700

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity:
Important

Vendor:
The Apache Software Foundation

Versions Affected:
OFBiz 16.11.01 to 16.11.05

Description:
The java.io.ObjectInputStream is known to cause Java serialisation issues.
This issue here is exposed by the "webtools/control/httpService" URL,
and uses Java deserialization to perform code execution.
In the HttpEngine, the value of the request parameter "serviceContext"
is passed to the "deserialize" method of "XmlSerializer".

Ofbiz is affected via two different dependencies:
"commons-beanutils" and an out-dated version of "commons-fileupload"

Mitigation:
Upgrade to 16.11.06
or manually apply the commits from
OFBIZ-10770 AND OFBIZ-10837 on branch 16
----

Credit:
Man Yue Mo of the Semmle Security Research Team
ricterzheng(郑杜涛) &lt;ricterzheng () tencent com&gt;

References:
http://ofbiz.apache.org/download.html#vulnerabilities

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

[CVE-2019-0189] Apache OFBiz remote code execution and arbitrary file delete via Java deserialization Jacopo Cappellato (Sep 10)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->